Method and device for sending and displaying messages, method and device for identity authentication

A technology for identity authentication and sending messages, applied in the field of information processing, can solve problems such as privacy leakage, unfavorable users, loss of personal property of the receiver, etc., and achieve the effect of ensuring privacy and security

Active Publication Date: 2021-07-30
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional setting method cannot take into account the information of these two aspects
[0003] If it is set to no prompt, it is not conducive to the user to know the content of the received message in time; if it is set to prompt the sender and content of the message, when the social software is in the login state, once the message is received, the content of the message will be displayed directly. , anyone with a mobile phone can see the content of the message, which may lead to the leakage of privacy
[0004] In addition, many lawbreakers send dangerous messages through social software or even steal other people's accounts, which may cause the recipients to suffer personal and property losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for sending and displaying messages, method and device for identity authentication
  • Method and device for sending and displaying messages, method and device for identity authentication
  • Method and device for sending and displaying messages, method and device for identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0106] The first implementation mode: detecting whether at least one of the one or more phrases that make up the message matches at least one of the preset keywords; at least one of the one or more phrases matches the When at least one of the preset keywords matches, the authentication level of the message is determined according to the matched keywords.

[0107] The second implementation mode: detecting whether at least one of the one or more phrases that make up the message matches at least one of the preset keywords; at least one of the one or more phrases matches the When at least one of the preset keywords matches, prompting the user at the sending end to input an authentication level; determining the authentication level input by the user at the sending end as the authentication level of the message.

[0108] A third implementation manner: obtaining the user input authentication level of the sending end; determining the authentication level of the user input at the sendi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to methods and apparatuses for sending and presenting messages, and methods and apparatuses for identity authentication. Through the method provided by the present disclosure, the sender can ensure that the sent message can only be seen by the receiver, thereby ensuring the privacy and security of the sender; in addition, the receiver can determine the authenticity of the received message and avoid false news harm caused.

Description

technical field [0001] The present disclosure relates to the technical field of information processing, and in particular to a method and device for sending and displaying messages, and an identity authentication method and device. Background technique [0002] While mobile social software such as WeChat and QQ bring convenience to people, it also raises many information security issues. For ordinary messages, the user's greatest need is convenience, that is, to directly prompt the sender and content of the message; but for messages that are highly private or involve property and other information, the user's greatest need is security. The traditional setting method cannot take into account the news of these two aspects. [0003] If it is set to no prompt, it is not conducive to the user to know the content of the received message in time; if it is set to prompt the sender and content of the message, when the social software is in the login state, once the message is receiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/18H04L63/083H04L63/0861H04L51/52
Inventor 盖国朕
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products